1
0
mirror of https://gitlab.com/comunic/comunicapiv3 synced 2025-02-12 04:02:39 +00:00
comunicapiv3/src/controllers/account_controller.rs

84 lines
2.7 KiB
Rust
Raw Normal View History

2020-06-29 15:53:39 +02:00
use crate::api_data::current_user_id::CurrentUserID;
2020-05-24 13:09:50 +02:00
use crate::api_data::login_success::LoginSuccess;
use crate::api_data::res_check_email_exists::ResCheckEmailExists;
use crate::api_data::res_check_security_questions_exists::ResCheckSecurityQuestionsExists;
2020-05-21 15:43:53 +02:00
use crate::controllers::routes::RequestResult;
2020-07-13 13:07:50 +02:00
use crate::data::error::ResultBoxError;
2020-05-24 13:09:50 +02:00
use crate::data::http_request_handler::HttpRequestHandler;
2020-07-13 13:07:50 +02:00
use crate::data::user::User;
use crate::helpers::{account_helper, user_helper};
2020-05-21 15:43:53 +02:00
/// Account controller
///
/// @author Pierre Hubert
2020-07-13 13:07:50 +02:00
impl HttpRequestHandler {
/// Get information about a user based on its email address specified in the request
pub fn post_user_info_from_email(&mut self, field: &str) -> ResultBoxError<User> {
let email = self.post_email(field)?;
self.ok_or_not_found(
user_helper::find_user_by_email(&email),
format!("Requested user in '{}' not found!", email).as_str(),
)
}
}
2020-05-21 15:43:53 +02:00
/// Sign in user
2020-05-23 17:09:28 +02:00
pub fn login_user(request: &mut HttpRequestHandler) -> RequestResult {
let email = request.post_email("userMail")?;
let password = request.post_string_opt("userPassword", 3, true)?;
// TODO : limit request
// Authenticate user
2020-05-23 19:17:48 +02:00
let token = account_helper::login_user(
&email, &password, request.api_client());
2020-05-23 17:09:28 +02:00
2020-05-23 19:17:48 +02:00
match token {
Ok(t) => {
2020-05-24 13:09:50 +02:00
request.set_response(LoginSuccess::new(&t))
}
2020-05-23 19:17:48 +02:00
Err(e) => {
// TODO : limit request
println!("Error on login: {}", e);
request.forbidden("Invalid email address / password!".to_string())
2020-05-24 13:09:50 +02:00
}
2020-05-23 19:17:48 +02:00
}
2020-05-24 17:57:47 +02:00
}
2020-05-24 19:19:07 +02:00
/// Sign out user
pub fn logout_user(request: &mut HttpRequestHandler) -> RequestResult {
account_helper::destroy_login_tokens(
2020-06-25 10:08:34 +02:00
&request.user_id()?,
2020-06-29 15:53:39 +02:00
request.api_client(),
2020-05-24 19:19:07 +02:00
)?;
request.success("User disconnected.")
}
/// Disconnect a user from all his devices
pub fn disconnect_all_devices(r: &mut HttpRequestHandler) -> RequestResult {
account_helper::destroy_all_user_tokens(r.user_id_ref()?)?;
r.success("Successfully disconnected!")
}
2020-05-24 17:57:47 +02:00
/// Get current user ID
pub fn user_id(request: &mut HttpRequestHandler) -> RequestResult {
2020-06-25 10:08:34 +02:00
request.set_response(CurrentUserID::new(&request.user_id()?))
}
/// Check out whether an email address exists or not
pub fn exists_mail(r: &mut HttpRequestHandler) -> RequestResult {
let email = r.post_email("email")?;
r.set_response(ResCheckEmailExists::new(account_helper::exists_mail(&email)?))
2020-07-13 13:07:50 +02:00
}
/// Check out whether a given user has set security questions or not
pub fn has_security_questions(r: &mut HttpRequestHandler) -> RequestResult {
let user = r.post_user_info_from_email("email")?;
r.set_response(ResCheckSecurityQuestionsExists::new(user.has_security_questions()))
2020-05-21 15:43:53 +02:00
}